Resubmissions

01-07-2024 12:39

240701-pvt8hssbpd 10

01-07-2024 11:57

240701-n4kvrstdkn 4

Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 12:39

General

  • Target

    Offer ZI-0428.rtf

  • Size

    293KB

  • MD5

    dde9d7d091ac0cc1d35515d259d8ca6f

  • SHA1

    c6e943143771fc3fd7c2c548f5fddcd6013d9302

  • SHA256

    95be57795b850e5aa098c80a107bafdb581da7653d9b57b8f2d37b89880de224

  • SHA512

    04f282c1b0333925454b7ab1c461c4ae395b0b8148bc6d51fd36368db2dc187daa6d273177d4ad15b50ede52bacf6271062dab70d45b871c8f805a8083844995

  • SSDEEP

    6144:4GuqGuqGuqGuqGuqGuqGuqGuqGuqGu9tNcTr:4

Malware Config

Extracted

Family

remcos

Botnet

sPITTT

C2

antfly50.sytes.net:1980

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-BW3KDF

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • NirSoft MailPassView 1 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 1 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 3 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Offer ZI-0428.rtf"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2248
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1228
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:2640
      • C:\Users\Admin\AppData\Roaming\plugman23456.scr
        "C:\Users\Admin\AppData\Roaming\plugman23456.scr"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1760
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\plugman23456.scr"
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2892
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\znlzneAxBVd.exe"
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2532
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\znlzneAxBVd" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA44B.tmp"
          3⤵
          • Scheduled Task/Job: Scheduled Task
          PID:1704
        • C:\Users\Admin\AppData\Roaming\plugman23456.scr
          "C:\Users\Admin\AppData\Roaming\plugman23456.scr"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2804
          • C:\Users\Admin\AppData\Roaming\plugman23456.scr
            C:\Users\Admin\AppData\Roaming\plugman23456.scr /stext "C:\Users\Admin\AppData\Local\Temp\mmsxkdzyjkunigwpzxgnouyjxeomy"
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:2468
          • C:\Users\Admin\AppData\Roaming\plugman23456.scr
            C:\Users\Admin\AppData\Roaming\plugman23456.scr /stext "C:\Users\Admin\AppData\Local\Temp\whxpkvksxsmstmsbjisorhtaylyvrfcn"
            4⤵
            • Executes dropped EXE
            PID:2384
          • C:\Users\Admin\AppData\Roaming\plugman23456.scr
            C:\Users\Admin\AppData\Roaming\plugman23456.scr /stext "C:\Users\Admin\AppData\Local\Temp\whxpkvksxsmstmsbjisorhtaylyvrfcn"
            4⤵
            • Executes dropped EXE
            • Accesses Microsoft Outlook accounts
            PID:2960
          • C:\Users\Admin\AppData\Roaming\plugman23456.scr
            C:\Users\Admin\AppData\Roaming\plugman23456.scr /stext "C:\Users\Admin\AppData\Local\Temp\zbka"
            4⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:1132

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Execution

    Command and Scripting Interpreter

    1
    T1059

    PowerShell

    1
    T1059.001

    Exploitation for Client Execution

    1
    T1203

    Scheduled Task/Job

    1
    T1053

    Scheduled Task

    1
    T1053.005

    Persistence

    Scheduled Task/Job

    1
    T1053

    Scheduled Task

    1
    T1053.005

    Privilege Escalation

    Scheduled Task/Job

    1
    T1053

    Scheduled Task

    1
    T1053.005

    Defense Evasion

    Modify Registry

    1
    T1112

    Credential Access

    Unsecured Credentials

    1
    T1552

    Credentials In Files

    1
    T1552.001

    Discovery

    System Information Discovery

    1
    T1082

    Collection

    Data from Local System

    1
    T1005

    Email Collection

    1
    T1114

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\remcos\logs.dat
      Filesize

      224B

      MD5

      e774ca36bac2ad5f2bfe08b73916dd02

      SHA1

      3926e73ddec251853463ca6f8dae5c81c3925261

      SHA256

      889c16ccef184d9c154fcb081e210ff385331f7bf3ec912fea12dc821c83fda6

      SHA512

      e9fd5458cec5e5a90bd508d51ecebfb3b1a8dec664005d81f4c3e0552572ab4ccd5987187adbcf61155eb72be127fd4f060ff6de19a0eeb217d5419b563e4d5b

    • C:\Users\Admin\AppData\Local\Temp\mmsxkdzyjkunigwpzxgnouyjxeomy
      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • C:\Users\Admin\AppData\Local\Temp\tmpA44B.tmp
      Filesize

      1KB

      MD5

      e1a025581e1c3c58a729c09b0f8a8497

      SHA1

      1e136d28cab0643da8d45042db400ff399ce5747

      SHA256

      b5360f925c84b1f8da923f04a4140a8b63e1c512cadc3273f3eb4bd294f60b02

      SHA512

      9f895c236a3a70032e19eba17b894ae44d7ba221ba0219f5341452ba88c5b06295023c831c3a38cef662572547564beb9b09ef4739041d3e9d689644e375ba83

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      07b6475fc506b60aff30028dffeb8523

      SHA1

      952e24c6e2b7707226a8c32c507a615c3f9e6244

      SHA256

      285747ac7ea369c28731968accbf780875e1a11b36be63f44eee7bd07e39bf66

      SHA512

      0ad74fd32b6323f98cc3a1b6149c42e3a102e367b8b9b791d42242da0808be44b2c8d4a80f15501a87a5ac374f33bdad566bad6a37a9e3c5a8319deef9f91ad8

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
      Filesize

      7KB

      MD5

      4c7e78fe68f89cb8986884c27fcd109e

      SHA1

      71c3ddc1ba3d3863f83306c7556839522fd10744

      SHA256

      9720077d5279e938a635ebf2559143432f12e82a0f7c6b00d5bfe9e1e1e32d80

      SHA512

      8ee960b3adaa025769ac34cbb717cd784ad29718d961b0600db1bc8b4388acd28f360404404a3e413ad2440686045d4397f33ced60a35c0dbd62a81a47a9256f

    • \Users\Admin\AppData\Roaming\plugman23456.scr
      Filesize

      1.1MB

      MD5

      28f77c9af8cb3ea886714bbfc8326635

      SHA1

      f6f02b22cd5a272c71a5afa66efd3b237fe4f24f

      SHA256

      f251fe71103ef7bc4cbdbcfe9c1d7c4a595f831e51cf4064f2bfa595f47bda35

      SHA512

      03508e0f3f68696f4f7b64aa737d40e8bd24b69ea7860a8fabee997d238454929605fe5b1ea0880af14cf3a89763d46e1fdeb9a526700d570b0d672330b5f82d

    • memory/1132-91-0x0000000000400000-0x0000000000424000-memory.dmp
      Filesize

      144KB

    • memory/1132-88-0x0000000000400000-0x0000000000424000-memory.dmp
      Filesize

      144KB

    • memory/1132-90-0x0000000000400000-0x0000000000424000-memory.dmp
      Filesize

      144KB

    • memory/1760-17-0x000000006B97E000-0x000000006B97F000-memory.dmp
      Filesize

      4KB

    • memory/1760-19-0x00000000010D0000-0x00000000011E8000-memory.dmp
      Filesize

      1.1MB

    • memory/1760-24-0x0000000000B00000-0x0000000000B10000-memory.dmp
      Filesize

      64KB

    • memory/1760-26-0x0000000000D80000-0x0000000000D8C000-memory.dmp
      Filesize

      48KB

    • memory/1760-27-0x0000000004CF0000-0x0000000004DB0000-memory.dmp
      Filesize

      768KB

    • memory/2248-141-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2248-1-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2248-0-0x000000002F2D1000-0x000000002F2D2000-memory.dmp
      Filesize

      4KB

    • memory/2248-2-0x000000007186D000-0x0000000071878000-memory.dmp
      Filesize

      44KB

    • memory/2248-72-0x000000007186D000-0x0000000071878000-memory.dmp
      Filesize

      44KB

    • memory/2468-80-0x0000000000400000-0x0000000000478000-memory.dmp
      Filesize

      480KB

    • memory/2468-81-0x0000000000400000-0x0000000000478000-memory.dmp
      Filesize

      480KB

    • memory/2468-77-0x0000000000400000-0x0000000000478000-memory.dmp
      Filesize

      480KB

    • memory/2804-59-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2804-54-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2804-63-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2804-65-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2804-66-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2804-67-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2804-68-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2804-70-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2804-48-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2804-74-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2804-73-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2804-52-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2804-44-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2804-153-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2804-46-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2804-64-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2804-154-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2804-146-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2804-145-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2804-42-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2804-56-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
      Filesize

      4KB

    • memory/2804-57-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2804-98-0x0000000010000000-0x0000000010019000-memory.dmp
      Filesize

      100KB

    • memory/2804-102-0x0000000010000000-0x0000000010019000-memory.dmp
      Filesize

      100KB

    • memory/2804-101-0x0000000010000000-0x0000000010019000-memory.dmp
      Filesize

      100KB

    • memory/2804-103-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2804-60-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2804-108-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2804-109-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2804-117-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2804-116-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2804-50-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2804-40-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2960-82-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
      Filesize

      4KB

    • memory/2960-85-0x0000000000400000-0x0000000000462000-memory.dmp
      Filesize

      392KB

    • memory/2960-86-0x0000000000400000-0x0000000000462000-memory.dmp
      Filesize

      392KB

    • memory/2960-83-0x0000000000400000-0x0000000000462000-memory.dmp
      Filesize

      392KB